diff --git a/clang-tools-extra/docs/clang-tidy/checks/boost-use-to-string.rst b/clang-tools-extra/docs/clang-tidy/checks/boost-use-to-string.rst --- a/clang-tools-extra/docs/clang-tidy/checks/boost-use-to-string.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/boost-use-to-string.rst @@ -8,7 +8,7 @@ ``std::to_string`` and ``std::to_wstring``. It doesn't replace conversion from floating points despite the ``to_string`` -overloads, because it would change the behaviour. +overloads, because it would change the behavior. .. code-block:: c++ diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone-easily-swappable-parameters.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-easily-swappable-parameters.rst --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone-easily-swappable-parameters.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-easily-swappable-parameters.rst @@ -202,7 +202,7 @@ Most of these cases, which are otherwise swappable from a caller's standpoint, have no way of getting "fixed" at the definition point. In the case of C++ templates, only primary template definitions and explicit -specialisations are matched and analysed. +specializations are matched and analyzed. None of the following cases produce a diagnostic: diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone-macro-parentheses.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-macro-parentheses.rst --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone-macro-parentheses.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-macro-parentheses.rst @@ -4,10 +4,10 @@ ========================== -Finds macros that can have unexpected behaviour due to missing parentheses. +Finds macros that can have unexpected behavior due to missing parentheses. Macros are expanded by the preprocessor as-is. As a result, there can be -unexpected behaviour; operators may be evaluated in unexpected order and +unexpected behavior; operators may be evaluated in unexpected order and unary operators may become binary operators, etc. When the replacement list has an expression, it is recommended to surround diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone-not-null-terminated-result.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-not-null-terminated-result.rst --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone-not-null-terminated-result.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-not-null-terminated-result.rst @@ -6,7 +6,7 @@ Finds function calls where it is possible to cause a not null-terminated result. Usually the proper length of a string is ``strlen(src) + 1`` or equal length of this expression, because the null terminator needs an extra space. Without the -null terminator it can result in undefined behaviour when the string is read. +null terminator it can result in undefined behavior when the string is read. The following and their respective ``wchar_t`` based functions are checked: @@ -61,7 +61,7 @@ obtain the capacity of the destination array then the new function could be the safe version (ending with ``cpy_s``). -- If the new function is could be safe version and C++ files are analysed and +- If the new function is could be safe version and C++ files are analyzed and the destination array is plain ``char``/``wchar_t`` without ``un/signed`` then the length of the destination array can be omitted. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-init-variables.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-init-variables.rst --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-init-variables.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-init-variables.rst @@ -4,7 +4,7 @@ ================================ Checks whether there are local variables that are declared without an initial -value. These may lead to unexpected behaviour if there is a code path that reads +value. These may lead to unexpected behavior if there is a code path that reads the variable before assigning to it. Only integers, booleans, floats, doubles and pointers are checked. The fix diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst @@ -5,7 +5,7 @@ Finds virtual classes whose destructor is neither public and virtual nor protected and non-virtual. A virtual class's destructor should be specified -in one of these ways to prevent undefined behaviour. +in one of these ways to prevent undefined behavior. This check implements `C.35 `_ diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst @@ -4,7 +4,7 @@ ==================== Finds uses of bitwise operations on signed integer types, which may lead to -undefined or implementation defined behaviour. +undefined or implementation defined behavior. The according rule is defined in the `High Integrity C++ Standard, Section 5.6.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/modernize-loop-convert.rst b/clang-tools-extra/docs/clang-tidy/checks/modernize-loop-convert.rst --- a/clang-tools-extra/docs/clang-tidy/checks/modernize-loop-convert.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/modernize-loop-convert.rst @@ -165,7 +165,7 @@ There are certain situations where the tool may erroneously perform transformations that remove information and change semantics. Users of the tool -should be aware of the behaviour and limitations of the check outlined by +should be aware of the behavior and limitations of the check outlined by the cases below. Comments inside loop headers diff --git a/clang-tools-extra/docs/clang-tidy/checks/modernize-use-default-member-init.rst b/clang-tools-extra/docs/clang-tidy/checks/modernize-use-default-member-init.rst --- a/clang-tools-extra/docs/clang-tidy/checks/modernize-use-default-member-init.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/modernize-use-default-member-init.rst @@ -36,7 +36,7 @@ .. option:: UseAssignment - If this option is set to `true` (default is `false`), the check will initialise + If this option is set to `true` (default is `false`), the check will initialize members with an assignment. For example: .. code-block:: c++ diff --git a/clang-tools-extra/docs/clang-tidy/checks/openmp-exception-escape.rst b/clang-tools-extra/docs/clang-tidy/checks/openmp-exception-escape.rst --- a/clang-tools-extra/docs/clang-tidy/checks/openmp-exception-escape.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/openmp-exception-escape.rst @@ -10,7 +10,7 @@ possibly compound, with a single entry at the top and a single exit at the bottom. Which means, ``throw`` may not be used to 'exit' out of the structured block. If an exception is not caught in the same structured block -it was thrown in, the behaviour is undefined. +it was thrown in, the behavior is undefined. FIXME: this check does not model SEH, ``setjmp``/``longjmp``. diff --git a/clang-tools-extra/docs/clang-tidy/checks/readability-redundant-declaration.rst b/clang-tools-extra/docs/clang-tidy/checks/readability-redundant-declaration.rst --- a/clang-tools-extra/docs/clang-tidy/checks/readability-redundant-declaration.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/readability-redundant-declaration.rst @@ -16,7 +16,7 @@ extern int X; -Such redundant declarations can be removed without changing program behaviour. +Such redundant declarations can be removed without changing program behavior. They can for instance be unintentional left overs from previous refactorings when code has been moved around. Having redundant declarations could in worst case mean that there are typos in the code that cause bugs. diff --git a/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst b/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst --- a/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst @@ -51,7 +51,7 @@ foo(b, src); -The abbreviations to recognise can be configured with the +The abbreviations to recognize can be configured with the :ref:`Abbreviations` check option. This heuristic is case-insensitive.